Sunday, 18 October 2015

A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast

Abstract

Addressing
key management in mobile multicast communication is currently a booming topic
due to the convergence of wireless and mobile technologies. With the
proliferation of multiple group based services that are possible to co-exist
within a single network, mobile subscribers could subscribe to these services
concurrently while ubiquitous. However, the existing group key management (GKM)
protocols intend to secure group communication for just a single group service.
The GKM approaches involve inefficient use of keys and huge rekeying overheads,
hence unsuitable for multiple multicast group environments. In this paper, we
propose a novel GKM protocol for multiple multicast groups, called slot based
multiple group key management (SMGKM) scheme. SMGKM supports the movement of
single and multiple members across a homogeneous or heterogeneous wireless
network while participating in multiple group services with minimized rekeying
transmission overheads. Unlike conventional GKM protocols, SMGKM protocol can
mitigate one-affect-n phenomenon, single point of failure and investment
pressure of signaling load caused by rekeying at the core network. Numerical
analysis and simulation results of the proposed protocol show significant
resource economy in terms of communication bandwidth overhead, storage
overheads at the Domain Key Distributor (DKD),
mobile receiver and Area Key Distributors while providing intense security.

Aim

The
aim is to improve the key management performance in the presence of multi-moves
participating in multi-group services.

Scope

SMGKM
used a new rekeying strategy based on lightweight KUS and SKDL for effectively
performing key management and authentication phases respectively during
handoff. SMGKM adopted independent TEK per cluster to localize rekeying and
mitigate one-affect-n phenomenon.

Existing System

Traditional
GKM protocols addressing rekeying over wired networks are divided in to
centralized, decentralized and contributory schemes. Centralized schemes rely
on the centralized server known as the Domain Key Distributor (DKD) for
generation and distribution of encryption keys. Contributory scheme has no
explicit DKD, thus group members collaborate for group key establishment.
Decentralized schemes partition the group into subgroups each managed by
subgroup managers in order to equally distribute the key management tasks hence
scalability. Work in further categorizes the GKM as common TEK and Independent
TEK per subgroup approaches depending on how the TEK is distributed in the
framework. Common TEK approaches utilize one TEK for all group members and
commonly suffer from one-affect-n phenomenon; thus rekeying of the new TEK
affect all the members subscribed to the same group in the entire network
whenever a membership change occurs. Independent TEK per subgroup approaches
try to alleviate the one-affect-n phenomenon caused by common TEK approaches,
by enabling each subgroup to independently manage its own TEK, thus rekeying of
the new TEK is localized within the affected subgroup during membership change.
However the GKM protocols did not consider host mobility during their
implementation though they cannot be extended to wireless mobile environment
directly. In order to address rekeying in wireless mobile environment, few GKM
protocols have been proposed recently. In addition to dynamic membership change
considered for GKM protocols in wired networks, these protocols consider
dynamic location change of members over a widely distributed wireless network
while seamlessly receiving subscribed multicast services securely. The
protocols adopt a decentralized framework for scalability, categorized them
according to common TEK and Independent TEK per subgroup approaches addressing
similar rekeying issues.

Disadvantages

However,
none of the GKM schemes address rekeying for multiple group services. Various
rekeying strategies consider a single multicast service.In
SMGKM the key management tasks are offloaded to the intermediate cluster
managers called Area Key Distributors (AKD) which establish the necessary key
management keys. SMGKM integrate our concept of session key distribution list
(SKDL) introduced for fast and secure authenticated handover along with initial
key establishment. SMGKM employ a lighter symmetric encryption suitable for
resource constraint mobile devices than heavier asymmetric effort. Compared to
the existing schemes, SMKGM save enormous communication bandwidth utilization
in the presence of multi-handoffs in multi-services.

Proposed System

We
propose a novel key management rekeying strategy, not realized in the design of
conventional approaches to address security for multi-service groups subscribed
by multi-users. However, this paper only considers dynamic member location
change of mobile hosts subscribed to multiple subscriptions without considering
dynamic membership change which is also applicable.

Advantages

A
new SMGKM scheme has been proposed to improve the key management performance in
the presence of multi-moves participating in multi-group services. It
considered providing backward confidentiality where mobile receivers
dynamically perform handoff while seamlessly maintaining diverse subscriptions.
In contrast to convectional schemes targeted for a single service, SMGKM used a
new rekeying strategy based on lightweight KUS and SKDL for effectively
performing key management and authentication phases respectively during
handoff. SMGKM adopted independent TEK per cluster to localize rekeying and
mitigate one-affect-n phenomenon. By offloading the key management and
authentication phases to the intermediate AKDs massively reduced signalling
load at the core network than in convectional schemes hence giving DKD
scalability while preventing bottlenecks. The SMGKM analytical model was
developed for two rekeying approaches: pairwise and LKH. Numerical analysis and
simulation results of the SMGKM performed much better using both rekeying
approaches in comparison to previous work. Thus SMGKM have shown significant
resource economy in terms of communication bandwidth overhead, storage
overheads at the DKD, AKD, and the mobile receiver while providing intense
security. Finally, the analytical study was explored by simulation for solving
the bandwidth optimization problem in SMGKM which showed efficiency in
bandwidth consumption in the presence of multi-services. However, SMGKM is
expected to become a practical dynamic solution for securely and efficiently
managing multi-services which can be received concurently by huge mobile
subscribers in the future wireless networks such as emerging Software- Defined
Networks.